Login / Signup
Generalized Insider Attack Detection Implementation using NetFlow Data.
Yash Samtani
Jesse Elwell
Published in:
CoRR (2020)
Keyphrases
</>
data analysis
data collection
data processing
attack detection
training data
sufficient conditions
user preferences
data acquisition